2 discussions and 1 case study and weekly Summary
Discussion 2.1
Define and compare Kinetic and non-Kinetic war?
Discussion 2.2
What laws apply to Cyberwarfare?
Case Study 2.1
The Intelligence Operations Process.
Writing Requirements
34 pages in length (excluding cover page, abstract, and reference list)
At least 3-4 peer-reviewed sources that are properly cited and referenced
APA format, Use the APA template located in theStudent Resource Centerto complete the assignment.
Please use the Case Study Guide as a reference point for writing your case study.
Weekly Summary 2.1
Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.
Writing Requirements
Use the APA template located in theStudent Resource Centerto complete the assignment.
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Cyberwarfare: Information
Operations in a Connected World
Lesson 2
Cyberwarfare, Law, Ethics, and
Intelligence Operations
Page 2Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Learning Objective(s)
Explain the role of law and ethics in
cyberwarfare.
Describe intelligence operations in
cyberwarfare.
Page 3Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Key Concepts
Kinetic warfare
Laws and ethics in cyberwarfare
Intelligence gathering processes, disciplines, and
techniques
The types of support intelligence can provide to
offensive and defensive cyberwarfare
How countries have gathered intelligence in a
connected world
Page 4Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
DISCOVER: CONCEPTS
Page 5Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Kinetic and Nonkinetic Warfare
Traditional type of
military conflict
Kinetic
warfare
High-technology
cyberwarfare
Nonkinetic
warfare
Page 6Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
International Law and Kinetic
Warfare
Categories of the laws of warfare
Jus ad bellum, Latin for the right to war
Jus in bello, Latin for the law of war
Legal review and legality of actions
Legal authority to determine what is/is not legal
according to international law resides with
international courts like International Court of
Justice (ICJ)
– Primary judicial branch of the United Nations
Page 7Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Civilian, Military, and Shared Use
of Infrastructure
Page 8Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Cyberwarfare Law
Cyberwarfare in a kinetic warfare context
Example: Stuxnet aimed at Irans uranium
enrichment facilities
Kinetic warfare law in a cyber context
Kinetic warfare crosses over into cyberwar when
combatants respond to or preempt cyberattacks
using traditional means of warfare
Page 9Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Ethics and Cyberwarfare
Ethical standards in existing international law
Self-defense
Proportionality
Limitations on targets
Common concepts in codes of ethics
Appropriate use of skills and capabilities
Professionalism
Adherence to existing laws and standards
Respect for privacy and confidentiality
Integrity in actions and access to systems and
data
Page 10Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
DISCOVER: OBJECTIVES
Page 11Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
The Tallinn Manual
An in-depth review and analysis that provides
nonbinding advice based on existing
international body of law around armed conflict
and related topics
Is a response to:
Focus on cyberattacks by nation-states and
nonstate actors
The challenges those attacks provide when
nation-states attempt to determine if their
activities or those of their attackers are covered
by international law
Page 12Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Tallinn Manual
Sovereignty, jurisdiction, and control
Responsibility
The use of force
Self-defense
Page 13Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Identification of Mercenary Actors in
Warfare
Page 14Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Determination of Use of Force By Nation-
State
Page 15Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Tallinn Manual
Civilians and infrastructure
Espionage, treachery, and ruses
Neutrality
Page 16Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Shared Use of Infrastructure in
the Cyberworld
Page 17Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
DISCOVER: CONTEXT
Page 18Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Overview of Intelligence
Operations
Intelligence: The collection, analysis, and
dissemination of information about the
capabilities, plans, intentions, and operations of
an adversary
May take place at behest of nations or nonstate
actors seeking to gain an advantage over a
military, political, criminal, or business
adversary
Page 19Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Overview of Intelligence
Operations (Cont.)
Using repeatable, organized approach to
intelligence collection and analysis ensures that
nations can:
Prioritize use of intelligence resources
Gather information needed by decision makers
at policymaking, strategic, and tactical levels
Page 20Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Intelligence Operations: Intelligence
Cycle
Page 21Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Data Processing During Intelligence
Cycle
Page 22Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
DISCOVER: TECHNOLOGY
Page 23Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Intelligence Disciplines
Human intelligence (HUMINT)
Signals intelligence (SIGINT)
Open source intelligence (OSINT)
Geospatial intelligence (GEOINT)
Measurement and signature intelligence
(MASINT)
Page 24Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Prioritization Chart for Ranking Potential
HUMINT Sources
Page 25Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
RC-135 Rivet Joint Aircraft Used for
SIGINT Collection Missions
C
o
u
rte
s
y
o
f th
e
U
. S
. A
ir F
o
rc
e
Page 26Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
U-2 Dragon Lady Aircraft Used for IMINT
Collection Missions
C
o
u
rte
s
y
o
f th
e
A
irm
a
n
1
s
t C
la
s
s
B
o
b
b
y
C
u
m
m
in
g
s
/U
. S
. A
ir F
o
rc
e
Page 27Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Slide from Colin Powells Presentation to
United Nations Security Council
C
o
u
rte
s
y
o
f th
e
W
h
ite
H
o
u
s
e
A
rc
h
iv
e
s
Page 28Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
DISCOVER: UNDERSTANDING
Page 29Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Supporting Offensive
Cyberwarfare
Providing information about potential targets
Collecting information about cyberwar
capabilities of third parties and using
information to frame a third party as the
source of an attack
Page 30Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Supporting Defensive
Cyberwarfare
Gathering information about adversaries
through intelligence
May leverage HUMINT, SIGINT, and other
traditional methods
Page 31Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Supporting Defensive
Cyberwarfare (Cont.)
Intelligence operations attempt to answer:
Who are potential adversaries?
What are adversaries technical capabilities?
What are cyberwarfare opponents plans and
intentions?
What signs warn of impending attack?
How will adversary make decisions about using
cyberwarfare techniques?
How will adversary communicate orders to engage
in cyberwarfare?
Page 32Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Case Studies: Media Reporting
on Intelligence Activities
Echelon
Telephone metadata
Muscular
Follow the Money
Quantum
Page 33Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Summary
Kinetic warfare
Laws and ethics in cyberwarfare
Intelligence gathering processes, disciplines, and
techniques
The types of support intelligence can provide to
offensive and defensive cyberwarfare
How countries have gathered intelligence in a
connected world